@techreport{21569,
  abstract     = {{Die kontinuierliche Weiterentwicklung des eigenen Geschäftsmodells ist für eine Organisation von entscheidender Bedeutung, um wettbewerbsfähig und somit nachhaltig erfolgreich zu bleiben. Während für die Entwicklung neuer Geschäftsmodelle häufig Workshops und einfache Software-Tools zur Visualisierung genutzt werden, wurden in der Forschung bereits erste Ansätze von datengetriebener Geschäftsmodellentwicklung (GME) vorgestellt. Diese Ansätze nutzen dabei Daten, Informationen oder auch Wissen aus internen und externen Unternehmensquellen, um den GME-Prozess zu unterstützen. Innerhalb dieses Beitrags zeigen wir einige Ansätze aus der aktuellen Literatur und analysieren wie ihre Datennutzung den GME-Prozess unterstützt. Weiterhin stellen wir mit dem BMDL Feature Modeler ein Tool vor, welches den GME-Prozess mit Expertenwissen unterstützt.}},
  author       = {{Gottschalk, Sebastian and Yigitbas, Enes}},
  publisher    = {{Gesellschaft für Informatik}},
  title        = {{{Von datenbasierter zu datengetriebener Geschäftsmodellentwicklung: Ein Überblick über Software-Tools  und deren Datennutzung}}},
  volume       = {{1}},
  year         = {{2021}},
}

@inproceedings{21570,
  author       = {{Tornede, Tanja and Tornede, Alexander and Wever, Marcel Dominik and Hüllermeier, Eyke}},
  booktitle    = {{Proceedings of the Genetic and Evolutionary Computation Conference}},
  title        = {{{Coevolution of Remaining Useful Lifetime Estimation Pipelines for Automated Predictive Maintenance}}},
  year         = {{2021}},
}

@article{21595,
  author       = {{Stockmann, Lars and Laux, Sven and Bodden, Eric}},
  issn         = {{2589-2258}},
  journal      = {{Journal of Automotive Software Engineering}},
  title        = {{{Using Architectural Runtime Verification for Offline Data Analysis}}},
  doi          = {{10.2991/jase.d.210205.001}},
  year         = {{2021}},
}

@phdthesis{21596,
  author       = {{Fischer, Andreas}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Computing on Encrypted Data using Trusted Execution Environments}}},
  year         = {{2021}},
}

@article{21597,
  author       = {{Holzinger, Philipp and Bodden, Eric}},
  journal      = {{International Symposium on Advanced Security on Software and Systems (ASSS)}},
  title        = {{{A Systematic Hardening of Java's Information Hiding}}},
  year         = {{2021}},
}

@article{21599,
  author       = {{Bonifacio, Rodrigo and Krüger, Stefan and Narasimhan, Krishna and Bodden, Eric and Mezini, Mira}},
  journal      = {{European Conference on Object-Oriented Programming (ECOOP)}},
  title        = {{{Dealing with Variability in API Misuse Specification}}},
  year         = {{2021}},
}

@misc{21601,
  abstract     = {{The invention describes a distributed merchandise management system, in which the client, retailer and the manufacturer are linked by a network. This is implemented by a cloud storage (105), the cloud storage (105) comprising a means (105 a) for storing data, a means for receiving first data from a first network node (110), the first data being associated with a physical object, a means for receiving request data from a second network node (120), a means for receiving second data from a third network node (130), the second data being associated with the first data and comprising at least one data piece adapted to change the first data depending on the received request data, a means for changing the first data based at least in part on the second data and the request data, and a means for sending a changed portion of the first data from the cloud storage (105) to the first network node (110).}},
  author       = {{Göllner, Thomas and Schwarz, Jan-Hendrik and Gottschalk, Sebastian and Sauer, Stefan}},
  title        = {{{Distributed merchandise management system}}},
  year         = {{2021}},
}

@inproceedings{21610,
  author       = {{Awais, Muhammad and Ghasemzadeh Mohammadi, Hassan and Platzner, Marco}},
  booktitle    = {{Proceedings of the ACM Great Lakes Symposium on VLSI (GLSVLSI) 2021}},
  location     = {{Virtual}},
  pages        = {{27--32}},
  publisher    = {{ACM}},
  title        = {{{LDAX: A Learning-based Fast Design Space Exploration Framework for Approximate Circuit Synthesis}}},
  doi          = {{https://doi.org/10.1145/3453688.3461506}},
  year         = {{2021}},
}

@misc{21627,
  author       = {{Liedtke, David}},
  title        = {{{Exploration and Convex Hull Construction in the Three-Dimensional Hybrid Model}}},
  year         = {{2021}},
}

@phdthesis{21628,
  abstract     = {{This thesis considers the realization of distributed data structures and the construction of distributed protocols for self-stabilizing overlay networks.

In the first part of this thesis, we provide distributed protocols for queues, stacks and priority queues that serve the insertion and deletion of elements within a logarithmic amount of rounds.
Our protocols respect semantic constraints such as sequential consistency or serializability and the individual semantic constraints given by the type (queue, stack, priority queue) of the data structure.
We furthermore provide a protocol that handles joining and leaving nodes.
As an important side product, we present a novel protocol solving the distributed $k$-selection problem in a logarithmic amount of rounds, that is, to find the $k$-smallest elements among a polynomial number of elements spread among $n$ nodes.
	
The second part of this thesis is devoted to the construction of protocols for self-stabilizing overlay networks, i.e., distributed protocols that transform an overlay network from any initial (potentially illegitimate) state into a legitimate state in finite time.
We present protocols for self-stabilizing generalized De Bruijn graphs, self-stabilizing quadtrees and self-stabilizing supervised skip rings.
Each of those protocols comes with unique properties that makes it interesting for certain distributed applications.
Generalized De Bruijn networks provide routing within a constant amount of hops, thus serving the interest in networks that require a low latency for requests.
The protocol for the quadtree guarantees monotonic searchability as well as a geometric variant of monotonic searchability, making it interesting for wireless networks or applications needed in the area of computational geometry.
The supervised skip ring can be used to construct a self-stabilizing publish-subscribe system.
}},
  author       = {{Feldmann, Michael}},
  title        = {{{Algorithms for Distributed Data Structures and Self-Stabilizing Overlay Networks}}},
  doi          = {{10.17619/UNIPB/1-1113}},
  year         = {{2021}},
}

@inproceedings{21639,
  abstract     = {{The development of effective business models is an essential task in highly competitive markets like mobile ecosystems. Existing development methods for these business models do not specifically focus that the development process profoundly depends on the situation (e.g., market size, regulations) of the mobile app developer. Here, a mismatch between method and situation can lead to poor resource management and longer development cycles. In software engineering, situational method engineering is used for software projects to configure a development method out of a method repository based on the project situation. Analogously, we support creating situation-specific business model development methods with a method base and new user roles. Here, the method engineer obtains the knowledge of the domain expert and stores it in the method base as elements, building blocks, and patterns. The expert knowledge is derived from a grey literature review on mobile development processes. After this, the method engineer constructs the development method based on the described situation of the business developer. We provide an open-source tool and evaluate it by constructing a local event platform's business model development method.    }},
  author       = {{Gottschalk, Sebastian and Yigitbas, Enes and Nowosad, Alexander and Engels, Gregor}},
  booktitle    = {{Enterprise, Business-Process and Information Systems Modeling}},
  keywords     = {{Business Model Development, Situational Method Engineering, Mobile App, Business Model Development Tools}},
  publisher    = {{Springer}},
  title        = {{{Situation-specific Business Model Development Methods for Mobile App Developers}}},
  doi          = {{10.1007/978-3-030-79186-5_17}},
  year         = {{2021}},
}

@book{23458,
  author       = {{Dumitrescu, Roman and Albers, Albert and Gausemeier, Jürgen and Riedel, Oliver and Stark, Rainer}},
  publisher    = {{Fraunhofer-Institut für Entwurfstechnik Mechatronik IEM, Paderborn}},
  title        = {{{Engineering in Deutschland – Status quo in Wirtschaft und Wissenschaft. Ein Beitrag zum Advanced Systems Engineering}}},
  year         = {{2021}},
}

@article{23466,
  abstract     = {{<jats:title>Abstract</jats:title>
               <jats:p>The term graphic novel has increasingly functioned as a catalyst for understanding comic books as an emergent literary genre. This article focuses on one specific element within this historical process: the claim, made by artists such as Alan Moore, that graphic novels are characterized by greater formal complexity, or density, than serial comics. These claims are evaluated by combining computational text and image recognition of a corpus of 131 graphic narratives with sociological metadata on production and circulation. The results show that Moore’s own book-length comics, in particular <jats:italic>Watchmen</jats:italic> and <jats:italic>V for Vendetta</jats:italic>, rank among the densest graphic narratives in the sample in both their visual and textual content. Graphic memoirs, in contrast, only show an increase in textual complexity. With Pierre Bourdieu, the article understands complexity as a social and aesthetic strategy that aims at increasing the cultural capital of comics creators. At the same time, the article contextualizes computational results against the background of a changing marketplace for comics, in particular the decline of serial comics, the shift towards digital printing, and increased access to book distribution. This analysis shows that graphic narratives pursue both literary and popular aesthetic strategies, challenging Bourdieu’s account of a clear opposition between profit and prestige in cultural production.</jats:p>}},
  author       = {{Dunst, Alexander and Hartel, Rita}},
  issn         = {{1865-8938}},
  journal      = {{Anglia}},
  number       = {{1}},
  pages        = {{195--223}},
  title        = {{{Computing Literary Surplus Value: Alan Moore and the Density of the Comic Book as Graphic Novel}}},
  doi          = {{10.1515/ang-2021-0010}},
  volume       = {{139}},
  year         = {{2021}},
}

@article{23525,
  abstract     = {{<jats:title>Abstract</jats:title><jats:p>In the field of Model-Driven Engineering, Triple Graph Grammars
(TGGs) play an important role as a rule-based means of implementing
consistency management. From a declarative specification of a
consistency relation, several operations including forward and
backward transformations, (concurrent) synchronisation, and
consistency checks can be automatically derived. For TGGs to be
applicable in realistic application scenarios, expressiveness in
terms of supported language features is very important. A TGG tool
is schema compliant if it can take domain constraints, such as
multiplicity constraints in a meta-model, into account when
performing consistency management tasks. To guarantee schema
compliance, most TGG tools allow application conditions to be
attached as necessary to relevant rules. This strategy is
problematic for at least two reasons: First, ensuring compliance to
a sufficiently expressive schema for all previously mentioned
derived operations is still an open challenge; to the best of our
knowledge, all existing TGG tools only support a very restricted
subset of application conditions. Second, it is conceptually
demanding for the user to indirectly specify domain constraints as
application conditions, especially because this has to be completely
revisited every time the TGG or domain constraint is changed. While
domain constraints can in theory be automatically transformed to
obtain the required set of application conditions, this has only
been successfully transferred to TGGs for a very limited subset of
domain constraints. To address these limitations, this paper
proposes a search-based strategy for achieving schema compliance. We
show that all correctness and completeness properties, previously
proven in a setting without domain constraints, still hold when
schema compliance is to be additionally guaranteed. An
implementation and experimental evaluation are provided to support
our claim of practical applicability.</jats:p>}},
  author       = {{Weidmann, Nils and Anjorin, Anthony}},
  issn         = {{0934-5043}},
  journal      = {{Formal Aspects of Computing}},
  publisher    = {{Springer}},
  title        = {{{Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming}}},
  doi          = {{10.1007/s00165-021-00557-0}},
  year         = {{2021}},
}

@inproceedings{23708,
  author       = {{Nouri, Zahra and Gadiraju, Ujwal and Engels, Gregor and Wachsmuth, Henning}},
  booktitle    = {{Proceedings of the 32nd ACM Conference on Hypertext and Social Media}},
  pages        = {{165--175}},
  title        = {{{What Is Unclear? Computational Assessment of Task Clarity in Crowdsourcing}}},
  year         = {{2021}},
}

@inproceedings{23730,
  author       = {{Castenow, Jannik and Harbig, Jonas and Jung, Daniel and Knollmann, Till and Meyer auf der Heide, Friedhelm}},
  booktitle    = {{Proceedings of the 17th International Symposium on Algorithms and Experiments for Wireless Sensor Networks (ALGOSENSORS)}},
  editor       = {{Gasieniec, Leszek and Klasing, Ralf and Radzik, Tomasz}},
  location     = {{Lissabon}},
  pages        = {{29 -- 44}},
  publisher    = {{Springer}},
  title        = {{{Gathering a Euclidean Closed Chain of Robots in Linear Time}}},
  doi          = {{10.1007/978-3-030-89240-1_3}},
  volume       = {{12961}},
  year         = {{2021}},
}

@inproceedings{23779,
  abstract     = {{Produktentstehung (PE) bezieht sich auf den Prozess der Planung und Entwicklung eines Produkts sowie der damit verbundenen Dienstleistungen von der ersten Idee bis zur Herstellung und zum Vertrieb. Während dieses Prozesses gibt es zahlreiche Aufgaben, die von menschlichem Fachwissen abhängen und typischerweise von erfahrenen Experten übernommen werden. Da sich das Feld der Künstlichen Intelligenz (KI) immer weiterentwickelt und seinen Weg in den Fertigungssektor findet, gibt es viele Möglichkeiten für eine Anwendung von KI, um bei der Lösung der oben genannten Aufgaben zu helfen. In diesem Paper geben wir einen umfassenden Überblick über den aktuellen Stand der Technik des Einsatzes von KI in der PE. 
Im Detail analysieren wir 40 bestehende Surveys zu KI in der PE und 94 Case Studies, um herauszufinden, welche Bereiche der PE von der aktuellen Forschung in diesem Bereich vorrangig adressiert werden, wie ausgereift die diskutierten KI-Methoden sind und inwieweit datenzentrierte Ansätze in der aktuellen Forschung genutzt werden.}},
  author       = {{Bernijazov, Ruslan and Dicks, Alexander and Dumitrescu, Roman and Foullois, Marc and Hanselle, Jonas Manuel and Hüllermeier, Eyke and Karakaya, Gökce and Ködding, Patrick and Lohweg, Volker and Malatyali, Manuel and Meyer auf der Heide, Friedhelm and Panzner, Melina and Soltenborn, Christian}},
  booktitle    = {{Proceedings of the 30th International Joint Conference on Artificial Intelligence (IJCAI-21)}},
  keywords     = {{Artificial Intelligence Product Creation Literature Review}},
  location     = {{Montreal, Kanada}},
  title        = {{{A Meta-Review on Artiﬁcial Intelligence in Product Creation}}},
  year         = {{2021}},
}

@inproceedings{20540,
  author       = {{Jovanovikj, Ivan and Thottam, Anu Tony and Joseph Vincent, Vishal and Yigitbas, Enes and Sauer, Stefan and Engels, Gregor}},
  booktitle    = {{Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development }},
  location     = {{Vienna}},
  pages        = {{232--239}},
  publisher    = {{SCITEPRESS}},
  title        = {{{A Modeling Workbench for the Development of Situation-specific Test Co-Migration Methods }}},
  year         = {{2021}},
}

@article{20683,
  author       = {{Feldkord, Björn and Knollmann, Till and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}},
  journal      = {{Theory of Computing Systems}},
  pages        = {{943–984}},
  title        = {{{Managing Multiple Mobile Resources}}},
  doi          = {{10.1007/s00224-020-10023-8}},
  volume       = {{65}},
  year         = {{2021}},
}

@inproceedings{20693,
  abstract     = {{In practical, large-scale networks, services are requested
by users across the globe, e.g., for video streaming.
Services consist of multiple interconnected components such as
microservices in a service mesh. Coordinating these services
requires scaling them according to continuously changing user
demand, deploying instances at the edge close to their users,
and routing traffic efficiently between users and connected instances.
Network and service coordination is commonly addressed
through centralized approaches, where a single coordinator
knows everything and coordinates the entire network globally.
While such centralized approaches can reach global optima, they
do not scale to large, realistic networks. In contrast, distributed
approaches scale well, but sacrifice solution quality due to their
limited scope of knowledge and coordination decisions.

To this end, we propose a hierarchical coordination approach
that combines the good solution quality of centralized approaches
with the scalability of distributed approaches. In doing so, we divide
the network into multiple hierarchical domains and optimize
coordination in a top-down manner. We compare our hierarchical
with a centralized approach in an extensive evaluation on a real-world
network topology. Our results indicate that hierarchical
coordination can find close-to-optimal solutions in a fraction of
the runtime of centralized approaches.}},
  author       = {{Schneider, Stefan Balthasar and Jürgens, Mirko and Karl, Holger}},
  booktitle    = {{IFIP/IEEE International Symposium on Integrated Network Management (IM)}},
  keywords     = {{network management, service management, coordination, hierarchical, scalability, nfv}},
  location     = {{Bordeaux, France}},
  publisher    = {{IFIP/IEEE}},
  title        = {{{Divide and Conquer: Hierarchical Network and Service Coordination}}},
  year         = {{2021}},
}

